Proceedings 2022 Network and Distributed System Security Symposium 2022
DOI: 10.14722/ndss.2022.24296
|View full text |Cite
|
Sign up to set email alerts
|

Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…By using rule-based generators adapted to a specific Datalog engine, it is straightforward to ensure syntactic correctness. However, as also highlighted by prior work on testing database engines [Jiang et al 2023…”
Section: Test Case Skeletonmentioning
confidence: 91%
See 1 more Smart Citation
“…By using rule-based generators adapted to a specific Datalog engine, it is straightforward to ensure syntactic correctness. However, as also highlighted by prior work on testing database engines [Jiang et al 2023…”
Section: Test Case Skeletonmentioning
confidence: 91%
“…Therefore, we append rules with a fixed, low probability 𝑃 𝑒𝑚𝑝𝑡 𝑦 to allow for empty results. Incrementally generating rules is beneficial for both considerations, as it enables us to incrementally build complex, valid test cases; the high-level idea is similar to DynSQL[Jiang et al 2023], which was proposed for fuzzing database engines, which, however, considered only test case validity.Last, we combine 𝑟 𝑛 and 𝑃 the new relations, and set the relation in the head of the rule 𝑟 𝑛 as the output relation of 𝑃…”
mentioning
confidence: 99%
“…First and foremost, a mechanism to force the execution of a large number of different interleaving is required (Interleaving Control). Existing fuzzers like MUZZ [23] and ConAFL [34] manipulate the thread priorities at assembly level, others like Krace [44] inject sleep instruction to force a context switch, while AutoInterfuzzing [42] and Conzzer [45] instrument the code with explicit synchronization barriers or thread locks. Alternatively, the interleaving exploration can be left to the natural nondeterminism of the operating system like in ConFuzz [43].…”
Section: Gray-box Fuzzingmentioning
confidence: 99%
“…Conzzer [45] improves upon the ideas of AutoInterfuzzing. More specifically, the instruction pairs are obtained at runtime and contain information about the execution trace.…”
Section: B Fuzzingmentioning
confidence: 99%
“…However, previous works have not studied how to detect violations of consistency models well when they actually occur. One line of previous works either leverages random testing approaches like fuzzing methods [8][9][10][11][12][13]. However, fuzzing cannot systematically explore the state space of SUTs; therefore, it may miss some bugs.…”
Section: Introductionmentioning
confidence: 99%